JP6018346B2 - 情報処理システム、制御方法及び制御プログラム - Google Patents

情報処理システム、制御方法及び制御プログラム Download PDF

Info

Publication number
JP6018346B2
JP6018346B2 JP2016529276A JP2016529276A JP6018346B2 JP 6018346 B2 JP6018346 B2 JP 6018346B2 JP 2016529276 A JP2016529276 A JP 2016529276A JP 2016529276 A JP2016529276 A JP 2016529276A JP 6018346 B2 JP6018346 B2 JP 6018346B2
Authority
JP
Japan
Prior art keywords
information
data
information processing
virtual
tag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
JP2016529276A
Other languages
English (en)
Japanese (ja)
Other versions
JPWO2015194438A1 (ja
Inventor
誠 岩村
誠 岩村
知範 幾世
知範 幾世
満昭 秋山
満昭 秋山
一史 青木
一史 青木
剛男 針生
剛男 針生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nippon Telegraph and Telephone Corp
Original Assignee
Nippon Telegraph and Telephone Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nippon Telegraph and Telephone Corp filed Critical Nippon Telegraph and Telephone Corp
Application granted granted Critical
Publication of JP6018346B2 publication Critical patent/JP6018346B2/ja
Publication of JPWO2015194438A1 publication Critical patent/JPWO2015194438A1/ja
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)
JP2016529276A 2014-06-17 2015-06-10 情報処理システム、制御方法及び制御プログラム Active JP6018346B2 (ja)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
JP2014124599 2014-06-17
JP2014124599 2014-06-17
PCT/JP2015/066771 WO2015194438A1 (ja) 2014-06-17 2015-06-10 情報処理システム、制御方法及び制御プログラム

Publications (2)

Publication Number Publication Date
JP6018346B2 true JP6018346B2 (ja) 2016-11-02
JPWO2015194438A1 JPWO2015194438A1 (ja) 2017-04-20

Family

ID=54935425

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2016529276A Active JP6018346B2 (ja) 2014-06-17 2015-06-10 情報処理システム、制御方法及び制御プログラム

Country Status (5)

Country Link
US (1) US10248790B2 (zh)
EP (1) EP3139298B1 (zh)
JP (1) JP6018346B2 (zh)
CN (1) CN106663170B (zh)
WO (1) WO2015194438A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11134089B2 (en) 2017-03-30 2021-09-28 Nec Corporation Malware analysis method, malware analysis device, and malware analysis system

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11016874B2 (en) * 2018-09-19 2021-05-25 International Business Machines Corporation Updating taint tags based on runtime behavior profiles
US11340835B2 (en) * 2020-07-28 2022-05-24 Dell Products L.P. Virtual non-volatile memory system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005534092A (ja) * 2002-07-23 2005-11-10 インターナショナル・ビジネス・マシーンズ・コーポレーション プログラムの潜在的にワームのような挙動の自動決定の方法および装置
US20110307951A1 (en) * 2010-06-11 2011-12-15 M86 Security, Inc. System and method for blocking the transmission of sensitive data using dynamic data tainting
JP2011257901A (ja) * 2010-06-08 2011-12-22 Nippon Telegr & Teleph Corp <Ntt> 解析システム、解析装置、解析方法及び解析プログラム
US20130145463A1 (en) * 2011-12-02 2013-06-06 Invincea, Inc. Methods and apparatus for control and detection of malicious content using a sandbox environment
WO2014188780A1 (ja) * 2013-05-20 2014-11-27 日本電信電話株式会社 情報処理装置及び特定方法

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5732080A (en) * 1995-07-12 1998-03-24 Bay Networks, Inc. Method and apparatus for controlling data flow within a switching device
US8898788B1 (en) * 2004-04-01 2014-11-25 Fireeye, Inc. Systems and methods for malware attack prevention
US8584239B2 (en) * 2004-04-01 2013-11-12 Fireeye, Inc. Virtual machine with dynamic data flow analysis
US8171553B2 (en) 2004-04-01 2012-05-01 Fireeye, Inc. Heuristic based capture with replay to virtual machine
US9027135B1 (en) * 2004-04-01 2015-05-05 Fireeye, Inc. Prospective client identification using malware attack detection
US7908653B2 (en) * 2004-06-29 2011-03-15 Intel Corporation Method of improving computer security through sandboxing
US20070079366A1 (en) 2005-10-03 2007-04-05 Microsoft Corporation Stateless bi-directional proxy
JP4899087B2 (ja) * 2006-03-24 2012-03-21 富士通株式会社 伝送システム
US8127360B1 (en) * 2006-06-29 2012-02-28 Symantec Corporation Method and apparatus for detecting leakage of sensitive information
US20090300751A1 (en) * 2008-05-30 2009-12-03 Balachander Krishnamurthy Unique packet identifiers for preventing leakage of sensitive information
JP5437964B2 (ja) 2010-10-06 2014-03-12 日本電信電話株式会社 解析方法、解析装置及び解析プログラム
CN102075617A (zh) 2010-12-02 2011-05-25 惠州Tcl移动通信有限公司 阻止手机病毒自动发送短消息的方法及其装置
CN102413134A (zh) 2011-11-17 2012-04-11 宇龙计算机通信科技(深圳)有限公司 一种传送数据的方法、系统及通信终端

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005534092A (ja) * 2002-07-23 2005-11-10 インターナショナル・ビジネス・マシーンズ・コーポレーション プログラムの潜在的にワームのような挙動の自動決定の方法および装置
JP2011257901A (ja) * 2010-06-08 2011-12-22 Nippon Telegr & Teleph Corp <Ntt> 解析システム、解析装置、解析方法及び解析プログラム
US20110307951A1 (en) * 2010-06-11 2011-12-15 M86 Security, Inc. System and method for blocking the transmission of sensitive data using dynamic data tainting
US20130145463A1 (en) * 2011-12-02 2013-06-06 Invincea, Inc. Methods and apparatus for control and detection of malicious content using a sandbox environment
WO2014188780A1 (ja) * 2013-05-20 2014-11-27 日本電信電話株式会社 情報処理装置及び特定方法

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11134089B2 (en) 2017-03-30 2021-09-28 Nec Corporation Malware analysis method, malware analysis device, and malware analysis system

Also Published As

Publication number Publication date
JPWO2015194438A1 (ja) 2017-04-20
CN106663170A (zh) 2017-05-10
EP3139298A4 (en) 2017-12-13
US20170206356A1 (en) 2017-07-20
CN106663170B (zh) 2019-06-25
EP3139298A1 (en) 2017-03-08
EP3139298B1 (en) 2019-10-16
WO2015194438A1 (ja) 2015-12-23
US10248790B2 (en) 2019-04-02

Similar Documents

Publication Publication Date Title
US10009381B2 (en) System and method for threat-driven security policy controls
US9294442B1 (en) System and method for threat-driven security policy controls
JP2019512791A (ja) クラウド環境における動的かつ一時的な仮想マシンインスタンスの保護
JP5965059B2 (ja) 情報処理装置及び特定方法
WO2018131199A1 (ja) 結合装置、結合方法および結合プログラム
WO2019184664A1 (zh) 恶意文件的检测方法、设备和系统
JP6018346B2 (ja) 情報処理システム、制御方法及び制御プログラム
CN107391999B (zh) 封装其它凭据提供者的凭据提供者
JP2014179025A (ja) 接続先情報抽出装置、接続先情報抽出方法、及び接続先情報抽出プログラム
US20180316696A1 (en) Analysis apparatus, analysis method, and analysis program
US20210274021A1 (en) Securing internal services in a distributed environment
JP6092759B2 (ja) 通信制御装置、通信制御方法、および通信制御プログラム
JP5876399B2 (ja) 不正プログラム実行システム、不正プログラム実行方法及び不正プログラム実行プログラム
JP6314036B2 (ja) マルウェア特徴抽出装置、マルウェア特徴抽出システム、マルウェア特徴方法及び対策指示装置
JP6676790B2 (ja) リクエスト制御装置、リクエスト制御方法、および、リクエスト制御プログラム
JP6911723B2 (ja) ネットワーク監視装置、ネットワーク監視方法及びネットワーク監視プログラム
WO2020255185A1 (ja) 攻撃グラフ加工装置、方法およびプログラム
KR102156600B1 (ko) 네트워크에서 수집된 패킷과 엔드포인트 컴퓨팅 장치의 프로세스 간의 연관관계를 생성하는 시스템 및 방법
JP2019125243A (ja) マルウェア検知システムおよびマルウェア検知方法
JP2017162042A (ja) 不正処理解析装置、および不正処理解析方法
CN108289032B (zh) 一种数据传输方法及装置
JP6687844B2 (ja) マルウエア解析装置、マルウエア解析方法及びマルウエア解析プログラム
Joshi et al. A Survey of Hypervisor Forensic in Cloud Computing
JP2012083799A (ja) ファイル収集監視方法、ファイル収集監視装置及びファイル収集監視プログラム
JP2019176273A (ja) 通信制御装置、クライアント装置、通信制御方法、及びプログラム

Legal Events

Date Code Title Description
TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20160927

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20160929

R150 Certificate of patent or registration of utility model

Ref document number: 6018346

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150